Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

 

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware,, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      Sign in to follow this  
      Need4Weed

      Worldwide IP Range Lookup and Range Finders etc

      1 post in this topic

      Hidden Content

        Give reaction to this post to see the hidden content.

       

      This is a IP Tool kit its the central backbone of IPs on the whole internet ! You can Find any sort of company to IP to IP ranges that run certain OS for hackign and scanning i use for !

      • Like 8
      • Thanks 1

      Share this post


      Link to post
      Share on other sites
      Guest
      This topic is now closed to further replies.
      Sign in to follow this  

      • Similar Content

        • By dEEpEst
          APT,‬ ‪Cyber warfare,‬ ‪Penetration testing,‬ ‪Zero-day,Exploiting,‬Fuzzing,Privilege-Escalation,browser-security‪,Spyware,Malwres evade anti-virus detection,‬ ‪Rookit CYPTER,‬ ‪Antiviruses Bypassing-av,‬ social engineering,WORMS,Sandbox-Escape,‬ ‪Memory-injection,‬ ‪Ethical,Gray,White,RedTeam,Bugbounty,bug hunter,Cheat Sheet‬...
          Cheat Sheet‬ A study on Advanced Persistent Threats.pdf AV-Sandbox-Presentation_v2.0.pdf AV_Evasion.pdf Addison.Wesley.Exploiting.Software.How.To.Break.Code.Feb.2004.ISBN.0201786958.pdf Aditya Sood and Richard Enbody (Auth.)-Targeted Cyber Attacks. Multi-staged Attacks Driven by Exploits and Malware-Syngress (2014).pdf Advanced Penetration Testing for Highly Secured Environments.pdf Advanced Persistent Threat Hacking, The Art & Science...pdf Advanced Polymorphic Techniques.pdf An Automated Online Packing Service for Optimal Antivirus Evasion.pdf An Automated Online Packing Service.pdf Antivirus , Firewall evasion techiniques.pdf Antivirus Evasion with.pdf Breaking the Sandbox.pdf BypassAVDynamics.pdf Bypassing Anti-.pdf CHAPTER 9 Strategies of Computer Worms.pdf Computer Virus Strategies and Detection.pdf CybraryAdvancedPenSlides.pdf DEFCON-20-King-Reflective-Injection-Detection.pdf Data Mining Tools for Malware Detection Mehedy Masud, Latifur Khan, Bhavani Thuraisingham--Auerbach Publications,CRC Press (2011).pdf Detect_Malware_w_Memory_Forensics.pdf ETHICAL HACKING AND PENETRATION.pdf EVOLUTION419.pdf Evading Antivirus Metasploit Webcast.pdf Fighting_Advanced_Threats.pdf FireEye_AdvMalwareExposed.pdf HACKING-17 Most Dangerous Hacking Attacks Volume 4 by ALEX WAGNER.pdf    Add files via upload    4 months ago HS-P005_ReflectiveDllInjection.pdf How did I get into the hacker world.rar    Add files via upload    2 months ago Hyperion_ Implementation of a PE-Crypter.pdf Introduction to Logical Privilege Escalation on Windows-D2T3 - James Forshaw .pdf La complessità del malware.pdf MITM ATTACK WITH PATCHING BINARIES ON THE FLY BY ADDING SHELLCODES.pdf MalWareBytes_sSecurity_IO.pdf Malware Analyst's Cookbook and DVD.pdf Malware Obfuscation with Threat Emulation.pdf Malware1.pdf Malware_Magazine_1.pdf McGraw.Hill.Hacking.Exposed.Linux.3rd.Edition.Jul.2008.ISBN.0072262575.pdf McGraw.Hill.Hacking.Exposed.Network.Security.Secrets.And.Solutions.2nd.Edition.Oct.2000.ISBN.0072127481.pdf McGraw.Hill.Hacking.Exposed.Network.Security.Secrets.And.Solutions.3rd.Edition.Sep.2001.ISBN.0072193816.pdf Mesbahi-One-Packer-To-Rule-Them-All-WP.pdf Mobile Malware Attacks And Defense.pdf Mohssen Mohammed_ Al-Sakib Khan Pathan-Automatic defense against zero-day polymorphic worms in communication networks-Auerbach (2013).pdf NOT OLD ENOUGH TO BE.pdf No.Starch.Practical.Malware.Analisys.Mar.2012.ISBN.1593272901.pdf Outsmarted – Why Malware Works in face.pdf Pattern-Oriented-Diagnostics-Debugging-Malware-Analysis-Reversing.pdf Patterns of a Cooperative Malware Analysis Workflow.pdf Piano Thieving for Experts - SABSA 2014 - v1.5.ppt Practical Anti-virus Evasion - avevasion_pentestmag.pdf README.md    Update README.md    2 months ago ROPInjector Using Return Oriented Programming for.pdf ROPInjector-Using-Return-Oriented-Programming-For-Polymorphism-And-Antivirus-Evasion.pdf Rowhammer.js A Remote Software-Induced Fault.pdf Ryan Linn - Getting Shells When Metasploit Fails - Sector 2012.pdf ScyllaHide.pdf Serial Variant Evasion Tactics.pdf Springer.Android.Malware.Jun.2013.ISBN.1461473934.pdf Springer.Computer.Viruses.And.Malware.Advances.In.Information.Security.Jul.2006.ISBN.0387302360.pdf Springer.Computer.Viruses.From.Theory.To.Applications.Sep.2005.ISBN.2287239391.pdf Spyware_Adware.pdf Stopping Zero-day Exploits for DUMMIES.PDF Syngress.Advanced.Persistent.Threat.Nov.2012.ISBN.1597499498.pdf Testing antivirus engines to determine theireffectiveness as a security layer.pdf The Art Of Human Hacking.pdf    Add files via upload    4 months ago The Deathof AV DefenseinDepth _- revisiting Anti-Virus Software.pdf The State of the Veil Framework - Will Schroeder and Chris Truncer.pdf The Threat of Evasive Malware.pdf The.Art.Of.Computer.Virus.Research.And.Defense.Feb.2005.ISBN.0321304543.chm UNPROTECTING THE CRYPTER.pdf Utilisation de Stub En VB.NET.pdf Why Antivirus.pdf Will Gragido, John Pirc-Cybercrime and Espionage_ An Analysis of Subversive Multi-Vector Threats-Syngress (2011).pdf Writing Zero Days for Security - APT Penetration Testing Framework v1.0.pdf Zero.Day.Exploit.Countdown.To.Darkness.Aug.2004.ISBN.1931836094.pdf advance-penetration-testing-kali-linux-training.pdf asia-16-Baloch-Bypassing-Browser-Security-Policies-For-Fun-And-Profit.pdf avevasion-techniques.pdf awesome phishing.md    Add files via upload    4 months ago b-advanced_persistent_threats_WP_21215957.en-us.pdf botnets-detection-measurement-disinfection-defence.pdf browser-security-whitepaper.pdf darkhotel_kl_07.11.pdf darkhotelappendixindicators_kl.pdf esg-apts-deep-discovery-whitepaper-en.pdf fatkit_dll_rc3.pdf fighter-pos-whitepaper-en.pdf fuzzing_four.rar how i learned to stop fuzzing and find more bugs.pdf jxia-JCS-wormdetection.pdf lumension_reflective-memory-injection.pdf rp-nss-labs-corporate-exploit-evasion-defenses.pdf security-guide-how-to-evade-anti-virus-detection.pdf whoamipriv-show me your privileges and I will lead you to SYSTEM.pdf  

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By dEEpEst
          Insanity-Framework
          THIS PROJECT ARE CLOSED NOW - FEEL FREE TO CONTINUE IT
          Copyright 2017 Insanity Framework (IF) 2.0 END
          Written by: * Alisson Moretto - 
          Hidden Content
          Give reaction to this post to see the hidden content. Special Thanks to Thomas Perkins - 
          Hidden Content
          Give reaction to this post to see the hidden content. Insanity Payload consists of encrypting your code and decrypting it in memory, thus avoiding a possible av signature, also has the ability to wait long enough to bypass a running sandbox.
          **NOTE: Insanity payloads may experience a 1 minute delay while connecting, this is necessary in order to bypass most avs and sandboxes. **
          Twitter: @4w4k3Official
          DISCLAIMER:
          "DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE." Taken from 
          Hidden Content
          Give reaction to this post to see the hidden content. . INSTALLATION OF DEPENDENT LIBRARIES
          cd Insanity-Framework
          chmod +x install.sh
          ./install.sh
          That's it
          Features
          Bypass most AV and Sandboxes. Remote Control. Payload Generation. Some Phishing methods are included on payloads generated. Detect Virtual Machines. Multiple Session disabled. Persistence and others features can be enabled. Bypass UAC. Memory Injection. Needed dependencies
          apt wine wget Linux sudo access python2.7 python 2.7 on Wine Machine pywin32 on Wine Machine VCForPython27 on Wine Machine Tested on:
          Kali Linux - SANA Kali Linux - ROLLING Ubuntu 14.04-16.04 LTS Debian 8.5 Linux Mint 18.1 Black Arch Linux Cloning:
          git clone https://github.com/4w4k3/Insanity-Framework.git Running:
          sudo python insanity.py If you have another version of Python:
          sudo python2.7 insanity.py Screenshot:

          Hidden Content
          Give reaction to this post to see the hidden content. More in 
          Hidden Content
          Give reaction to this post to see the hidden content. Contribute:
          Send me more features if you want it 😄
          I need your help for Insanity to become better!
          Things needed to be improved and future updates:
          File Transfer (FTP) Webcam Snaps and Streaming Keylogging Print Screens Download:

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe?

          Hidden Content
          Give reaction to this post to see the hidden content.  

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe?

          Hidden Content
          Give reaction to this post to see the hidden content.  
          EasySploit v3.1 (Linux) - Metasploit automation (EASIER and FASTER than EVER)
          Options:

          (1) Windows --> test.exe (payload and listener)
          (2) Android --> test.apk (payload and listener)
          (3) Linux --> test.py (payload and listener)
          (4) MacOS --> test.jar (payload and listener)
          (5) Web --> test.php (payload and listener)
          (6) Scan if a target is vulnerable to ms17_010
          (7) Exploit Windows 7/2008 x64 ONLY by IP (ms17_010_eternalblue)
          (8) Exploit Windows Vista/XP/2000/2003 ONLY by IP (ms17_010_psexec)
          (9) Exploit Windows with a link (HTA Server)
          (10) Contact with me - My accounts

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By xMrxKanex
          Hello everybody,
          I want to install a Possum Bot on a Discord Server, but it doesnt work.
          I used this tutorial.
          After i got the Link at Step 9, i cant select a Server.
          Does anybody have experience with a Possum Bot and can help me out
           
          A bot that will allow you to "hack" ANY discord server.
          # Features
          * `Get full control of the server.`
          * `Ban everyone in a matter of seconds.`
          * `More features coming soon!`
          # Commands
          * !myakish - to get admin perms.
          * !arturdebil - to ban everyone on the server.
          # Dependencies.
          * Node v10.13.0 or higher , you can get  it [here](https://nodejs.org/en/download/)
          # Installation
          To install this bot follow these simple steps.
          1. Download and un-zip the repo.
          2. Install node.js you can get it [here.](https://nodejs.org/en/download/)
          3. Open cmd or terminal if your using mac.
          4. Type in `cd` and drag and drop the possumbot folder into the console. Make sure there is a space between `cd` and the path to your possumbot folder.
          5. Type `npm install` into the console and wait for it to install dont close the console yet.
          If it doesnt work make sure you have node.js installed you can install it [here.](https://nodejs.org/en/download/)
          If it still doesnt work restart your console.
          6. Open your browser and go to [discord.com/developers](https://discordapp.com/developers/applications/)
          And create a new application and customize it to your likings.
          You should see something like thcis.
          ![You should see something like this.](https://media.discordapp.net/attachments/508571077958434839/511258005937979392/2018-11-11_21.14.15.png)
          Navigate to the bot settings
          And copy the token.
          After you copied the token proceed to the next step.
          ![](https://cdn.discordapp.com/attachments/508571077958434839/511259113712517130/2018-11-11_21.21.00.png)
          7. Open the possumbot folder and navigate to `botsettings.json` open it using a text editor like notepad for windows or textedit for mac.
          It should look like this
          ![](https://media.discordapp.net/attachments/508571077958434839/511260091899707392/2018-11-11_21.11.08.png)
          8. Paste your token into the token field. Dont remove the "".
          9. Open your console (You should already be in your possumbot folder).
          Type `node bot.js` into the console.
          The bot should now be activated.
          10. A link will be generated in the console use it to invite the bot.